Securable networked scheme with face authentication
Open Access
- 9 September 2021
- journal article
- research article
- Published by Institution of Engineering and Technology (IET) in IET Biometrics
- Vol. 11 (2), 97-108
- https://doi.org/10.1049/bme2.12056
Abstract
Recently, facial recognition has been extensively adopted in various fields. Wide applications are associated with a large amount of data transmission so that edge computing is inspired accordingly. In this research task, the major goal of edge computing is to handover a part of the computing work to the terminal equipment; the server only needs to process the results of final return. The IoT configuration proposed includes a perception layer, a transmission layer, and an application layer to fulfil a complete IoT system. In the perception layer, the facial authentication mechanism is adopted. This system is equipped with a highly robust anti-spoofing function, which can avoid criminal access from photos or electronic screens. Finally, the IoT transmission system is realised as the transmission layer. Combined with such a transmission mechanism, one can distribute user facial features to user's electronic devices instead of storing it in the server. This not only saves storage resources and transmission costs, but also allows users to complete data transmission and face authentication easily.Keywords
Funding Information
- Ministry of Science and Technology, Taiwan (MOST 108‐2221‐E−005‐077‐MY2)
This publication has 24 references indexed in Scilit:
- A Discriminative Feature Learning Approach for Deep Face RecognitionPublished by Springer Science and Business Media LLC ,2016
- Joint Face Detection and Alignment Using Multitask Cascaded Convolutional NetworksIEEE Signal Processing Letters, 2016
- Deep Residual Learning for Image RecognitionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016
- Compact Representation of High-Dimensional Feature Vectors for Large-Scale Image Recognition and RetrievalIEEE Transactions on Image Processing, 2016
- Going deeper with convolutionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Face spoofing detection from single images using micro-texture analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Face Liveness Detection from a Single Image with Sparse Low Rank Bilinear Discriminative ModelLecture Notes in Computer Science, 2010
- Live face detection based on the analysis of Fourier spectraPublished by SPIE-Intl Soc Optical Eng ,2004
- Face recognition using eigenfacesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Eigenfaces vs. Fisherfaces: recognition using class specific linear projectionIEEE Transactions on Pattern Analysis and Machine Intelligence, 1997